edix / HiddenProcessDetectionLinks
Examples for detection of hidden processes on windows
☆34Updated 11 years ago
Alternatives and similar repositories for HiddenProcessDetection
Users that are interested in HiddenProcessDetection are comparing it to the libraries listed below
Sorting:
- Simple standalone bundle of NT core APIs☆27Updated 9 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Protect process fsfilter driver. Windows x64☆36Updated 9 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Updated 12 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 12 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- library, which help to describe or load and execute PE files.☆55Updated 12 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Updated 11 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- MIR-Engine☆24Updated 8 years ago
- Simple program for static hooking dynamic libraries in executable application☆23Updated 11 years ago
- A-Protect Anti Rootkit Tool☆54Updated 11 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆37Updated 11 years ago
- ☆33Updated 7 years ago
- A Windows driver used to facilitate DLL injection☆26Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆18Updated 11 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- Windows anti-rootkit library☆37Updated 10 years ago
- Anti-Anti-VM solution via Windows Driver☆59Updated 7 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago